Unlock instant, AI-driven research and patent intelligence for your innovation.

Vulnerability detection method and device

A vulnerability detection and vulnerability technology, applied in computer security devices, instruments, electrical digital data processing and other directions, can solve problems such as low efficiency, and achieve the effect of improving detection efficiency

Active Publication Date: 2015-04-29
SHENZHEN TENCENT COMP SYST CO LTD
View PDF8 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The traditional vulnerability detection method only supports simple capture of the form information submitted by the page, and then the user manually modifies the data to determine whether there is a vulnerability, which is inefficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability detection method and device
  • Vulnerability detection method and device
  • Vulnerability detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0024] Unless the context clearly states otherwise, the number of elements and components in the present invention can exist in a single form or in multiple forms, and the present invention is not limited thereto. Although the steps in the present invention are arranged with labels, they are not used to limit the order of the steps. Unless the order of the steps is clearly stated or the execution of a certain step requires other steps as a basis, the relative order of the steps can be adjusted. It can be understood that the term "and / or" used herein refers to and covers any and all possible combina...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a vulnerability detection method. The vulnerability detection method includes visiting a webpage to be detected, in the non-Cookie manner to acquire a first form; visiting the webpage to be detected, in the Cookie manner to acquire a second form; judging whether or not the first form and the second form are the same, if not, according to the second form, detecting whether or not a vulnerability occurs to the webpage to be detected. In this way, detection efficiency is improved. A vulnerability detection device is further provided.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a loophole detection method and device. Background technique [0002] Many existing websites may have some vulnerabilities. For example, CSRF (Cross-site request forgery, cross-site request forgery) is a malicious use of the website, which allows hackers to pretend to be legitimate users, so that legitimate users do not know Risky operations such as financial payment and posting microblogs are triggered in the event of a situation, and can directly lead to worms, causing great harm. [0003] The inventor finds that there are at least the following technical problems in the prior art: [0004] The traditional vulnerability detection method only supports simple capture of the form information submitted by the page, and then the user manually modifies the data to determine whether there is a vulnerability, which is inefficient. Contents of the invention [0005] Based ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/50
CPCG06F21/577G06F2221/034
Inventor 罗嘉飞翁家才
Owner SHENZHEN TENCENT COMP SYST CO LTD